2019-06-27 18:44:46 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
2020-06-24 05:08:32 -04:00
|
|
|
RSpec.describe Gitlab::Auth::IpRateLimiter, :use_clean_rails_memory_store_caching do
|
2019-06-27 18:44:46 -04:00
|
|
|
let(:ip) { '10.2.2.3' }
|
|
|
|
let(:whitelist) { ['127.0.0.1'] }
|
|
|
|
let(:options) do
|
|
|
|
{
|
|
|
|
enabled: true,
|
|
|
|
ip_whitelist: whitelist,
|
|
|
|
bantime: 1.minute,
|
|
|
|
findtime: 1.minute,
|
|
|
|
maxretry: 2
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
subject { described_class.new(ip) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
stub_rack_attack_setting(options)
|
2021-02-01 07:09:03 -05:00
|
|
|
Rack::Attack.reset!
|
|
|
|
Rack::Attack.clear_configuration
|
|
|
|
Gitlab::RackAttack.configure(Rack::Attack)
|
2019-06-27 18:44:46 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
after do
|
|
|
|
subject.reset!
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#register_fail!' do
|
|
|
|
it 'bans after 3 consecutive failures' do
|
|
|
|
expect(subject.banned?).to be_falsey
|
|
|
|
|
|
|
|
3.times { subject.register_fail! }
|
|
|
|
|
|
|
|
expect(subject.banned?).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
shared_examples 'whitelisted IPs' do
|
|
|
|
it 'does not ban after max retry limit' do
|
|
|
|
expect(subject.banned?).to be_falsey
|
|
|
|
|
|
|
|
3.times { subject.register_fail! }
|
|
|
|
|
|
|
|
expect(subject.banned?).to be_falsey
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with a whitelisted netmask' do
|
|
|
|
before do
|
|
|
|
options[:ip_whitelist] = ['127.0.0.1', '10.2.2.0/24', 'bad']
|
|
|
|
stub_rack_attack_setting(options)
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'whitelisted IPs'
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with a whitelisted IP' do
|
|
|
|
before do
|
|
|
|
options[:ip_whitelist] = ['10.2.2.3']
|
|
|
|
stub_rack_attack_setting(options)
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'whitelisted IPs'
|
|
|
|
end
|
|
|
|
end
|
2019-12-03 16:06:23 -05:00
|
|
|
|
|
|
|
shared_examples 'skips the rate limiter' do
|
|
|
|
it 'does not call Rack::Attack::Allow2Ban.reset!' do
|
|
|
|
expect(Rack::Attack::Allow2Ban).not_to receive(:reset!)
|
|
|
|
|
|
|
|
subject.reset!
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not call Rack::Attack::Allow2Ban.banned?' do
|
|
|
|
expect(Rack::Attack::Allow2Ban).not_to receive(:banned?)
|
|
|
|
|
|
|
|
subject.banned?
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not call Rack::Attack::Allow2Ban.filter' do
|
|
|
|
expect(Rack::Attack::Allow2Ban).not_to receive(:filter)
|
|
|
|
|
|
|
|
subject.register_fail!
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when IP is whitlisted' do
|
|
|
|
let(:ip) { '127.0.0.1' }
|
|
|
|
|
|
|
|
it_behaves_like 'skips the rate limiter'
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when rate limiter is disabled' do
|
|
|
|
let(:options) { { enabled: false } }
|
|
|
|
|
|
|
|
it_behaves_like 'skips the rate limiter'
|
|
|
|
end
|
2019-06-27 18:44:46 -04:00
|
|
|
end
|